Safety on Digital Space : Concerns and Measures : Daily Current Affairs

Date: 16/11/2022

Relevance: GS-3: Role of Media and Social Networking Sites in Internal Security Challenges, Basics of Cyber Security.

Key Phrases: Youngest youth Demographics, Online interactions, Private pictures, Digital platforms, Protectors, Mass panic, Technology-facilitated Abuse, Evidence-based Discussion, Digital Platforms, Design choices, Open Source Technology, Safety tools and Features, Societal cooperation, Public discourse.

Context:

  • India has one of the youngest youth demographics in the world and is among the most active online. As online interactions increase, more and more content is created and shared among people, helping them form new and wonderful connections. Sometimes, however, these interactions also make them vulnerable to harm.

Key Highlights:

  • As per the NCRB Data, A total of 50,035 cases in 2020 were registered under cyber crimes, showing an increase of 11.8 per cent in registration over 2019 (44,735 cases).

Challenges in the Digital Space:

  • Circulation of Private Pics and Videos
    • Private pictures of young women are leaked online. Sometimes it is from a hacked account, other times because of a soured relationship.
    • It should be no surprise that young men and women are exploring new ways to express their sexuality through sharing intimate images.
    • These new social norms have created new forms of abuse where women are usually the victims.
  • Anonymity
    • Digital social spaces provide anonymity, which is great for free speech but can be stifling for nuanced debate and dialogue.
    • They fuel the polarization of ideas while providing a free run for peddlers of misinformation.
  • Cyberbullying
    • The impact of online sexual harassment could have long-term negative impacts on their mental health and well-being.

The Information Technology Act, 2000

  • About
    • It came into force on October 17, 2000, and contains cyber laws in India.
    • The main objective of the Act is to provide legal recognition to electronic commerce and to facilitate the filing of electronic records with the government.
  • Important Sections
    • Section 66E – Publishing obscene images
    • Section 67 – Publishes or transmits unsolicited material
    • Section 67A – Publishes or transmits explicit sex
    • Section 67B – Abusing children online

Measures taken by Stakeholders

  • Research
    • Leading academics are spearheading research around the topic to discuss the evolution of technology-facilitated abuse.
  • New IT Rules
    • New IT rules have shown concern regarding the safety and security of users, particularly women and children.
    • With the overhaul of the IT Act, there is an opportunity to discuss in detail the nature of technology-facilitated abuse.
    • This could be the start of an era of an evidence-based discussion.

The IT (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021

  • About
    • The New Information Technology (IT) Rules ensure the online safety and dignity of women users and give a framework to deal with content, including fake content, which results in heinous crimes.
  • Features
    • Imposes several obligations on online entities including appointing grievance redressal officers and assisting in investigations.
    • Provides a set of checks and balances for the removal of unlawful content and information on the internet.
    • Empower the ordinary users of social media digital platforms and make intermediaries, including the social media intermediaries, accountable.
      • Intermediaries shall remove or disable access within 24 hours of receipt of complaints of contents that exposes the private areas of individuals, show such individuals in full or partial nudity or a sexual act or is in the nature of impersonation including morphed images, etc.

Way Forward:

  • Platforms need to design choices that help women stay in control of who they engage with.
    • They should leverage open-source technology that detects and blurs lewd images so that women don’t need to see unsolicited pictures.
  • There is a need to upgrade the existing cyber cells by setting up dark web monitoring cells and social media monitoring cells to tackle different types of cyber along with traditional police recruitments, there is a need to induct technical experts into the police force.
  • The States should map the cybercrime hotspots which will help in the quick detection of crimes and taking proactive measures to prevent cyber crimes.
  • We need to focus on safety tools and features across the spectrum of websites and apps.
  • Public discourse around technology-facilitated abuse has to be elevated.
  • There’s a need for new codes of ethics that define how tech and society interact to promote societal well-being.
  • Users need to go beyond protecting their log-in details and one-time-passwords (OTPs) and enable safety measures such as two-factor authentication.
    • This feature can be an effective safeguard against unauthorized access to online accounts; however, very few use it.

Conclusion:

  • Comprehensive solutions require a multi-stakeholder approach - tech developers should create responsible products that enable safety and privacy by design, and governments can enact regulations and policies that protect users’ rights while promoting healthy competition.

Source: Indian Express

Mains Question:

Q. Social media is a double-edged sword. Critically analyse the statement and also provide measures to address these issues. (250 Words).